Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Computer Vision Metrics
Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors actually work, ...
New Horizons for a Data-Driven Economy
In this book readers will find technological discussions on the existing and emerging technologies across the different stages of the big data value chain. They will learn about legal aspects of big data, the social impact, and about education needs and requirements. And they will discover the business perspective and how big data technology can be...
The Huawei and Snowden Questions
PreliminaryThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of comp...
Enhanced Living Environments
This book is the final publication of the COST Action IC1303 "Algorithms, Architectures and Platforms for Enhanced Living Environments (AAPELE)" project.Ambient Assisted Living (AAL) is an area of research based on Information and Communication Technologies (ICT), medical research, and sociological research. AAL is based on the notion tha...
Computer Aided Verification
The book set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organ...
Intertwingled
This engaging volume celebrates the life and work of Theodor Holm "Ted" Nelson, a pioneer and legendary figure from the history of early computing. Presenting contributions from world-renowned computer scientists and figures from the media industry, the book delves into hypertext, the docuverse, Xanadu, and other products of Ted Nelson�...
Theoretical and Practical Advances in Computer-based Educational Measurement
This book presents a multitude of different, yet related, innovations in educational measurement and provides insight in their practical possibilities.The book not only addresses several improvements in the quality of educational measurement and innovations in (inter)national large scale assessments, but also several advances in psychometrics and i...
S-BPM Illustrated
S-BPM stands for "subject-oriented business process management" and focuses on subjects that represent the entities (people, programs etc.) that are actively engaged in processes. S-BPM has become one of the most widely discussed approaches for process professionals. Its potential particularly lies in the integration of advanced informati...
Internet of Things
First IFIP International Cross-Domain Conference, IFIPIoT 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Revised Selected Papers...
Fundamentals of Clinical Data Science
This book comprehensively covers the fundamentals of clinical data science, focusing on data collection, modelling and clinical applications. Topics covered in the first section on data collection include: data sources, data at scale (big data), data stewardship (FAIR data) and related privacy concerns. Aspects of predictive modelling using tec...
Agricultural and Forestry Reconstruction After the Great East Japan Earthquake
This book summarizes the results of 3 years of agricultural and forestry reconstructive efforts and applied research conducted directly in the affected areas of Fukushima following the Great East Japan Earthquake. It describes fast and effective revival methods and technologies from tsunami and radiation damages, demonstrated through the collaborat...
Language Technologies for the Challenges of the Digital Age
This open access volume constitutes the refereed proceedings of the 27th biennial conference of the German Society for Computational Linguistics and Language Technology, GSCL 2017, held in Berlin, Germany, in September 2017, which focused on language technologies for the digital age. The 16 full papers and 10 short papers included in the proceeding...
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Elements of Robotics
This book bridges the gap between playing with robots in school and studying robotics at the upper undergraduate and graduate levels to prepare for careers in industry and research. Robotic algorithms are presented formally, but using only mathematics known by high-school and first-year college students, such as calculus, matrices and probability. ...
eIoT
This book explores the collision between the sustainable energy transition and the Internet of Things (IoT). In that regard, this book's arrival is timely. Not only is the Internet of Things for energy applications, herein called the energy Internet of Things (eIoT), rapidly developing but also the transition towards sustainable energy to abat...
Factories of the Future
This book presents results relevant in the manufacturing research field, that are mainly aimed at closing the gap between the academic investigation and the industrial application, in collaboration with manufacturing companies. Several hardware and software prototypes represent the key outcome of the scientific contributions that can be grouped int...
Android on x86
Android on x86: an Introduction to Optimizing for IntelĀ® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel's x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x...
Happiness is the Wrong Metric
This timely book addresses the conflict between globalism and nationalism. It provides a liberal communitarian response to the rise of populism occurring in many democracies. The book highlights the role of communities next to that of the state and the market. It spells out the policy implications of liberal communitarianism for privacy, freedom o...
Forecasting and Assessing Risk of Individual Electricity Peaks
The overarching aim of this book is to present self-contained theory and algorithms for investigation and prediction of electric demand peaks. A cross-section of popular demand forecasting algorithms from statistics, machine learning and mathematics is presented, followed by extreme value theory techniques with examples.In order to achieve carbon t...
Socioeconomic and Environmental Implications of Agricultural Residue Burning
This book discusses the important issue of the socioeconomic and environmental impacts of agricultural residue burning, common in agricultural practices in many parts of the world. In particular, it focuses on the pollution caused by rice residue burning using primary survey data from Punjab, India. It discusses emerging solutions to agricultural w...
Field Guide to the Distributed Development Stack
When you explore a new technology landscape, the journey can take you to places you never expected. Take O'Reilly's CTO, Andrew Odewahn. While working on ideas for a new publishing platform, Andrew kept notes as he probed the depth and breadth of what we call the "distributed development stack" (DDS). As patterns emerged, and...
What Is Data Science?
We've all heard it: according to Hal Varian, statistics is the next sexy job. Five years ago, in What is Web 2.0, Tim O'Reilly said that "data is the next Intel Inside." But what does that statement mean? Why do we suddenly care about statistics and about data? This report examines the many sides of data science - the technologi...
Software & Hardware Collide
Over the last few years, members of the O'Reilly community have increasingly turned their attention to hardware. It's getting much easier to design, prototype, build and market hardware, and it's getting easier to integrate software and hardware into fluid packages of intelligence, beauty, and intuitive design. Hardware and software ...
Lightweight Systems for Realtime Monitoring
If you're looking to access and make sense of all your data in real time, there's a more cost-effective and efficient way than using expensive commercial tool suites. In this O'Reilly report, Sam Newman from ThoughtWorks describes several small, freely available open source tools and frameworks for freeing data locked up in silos and...
Cloud Native Applications
Cloud computing is a game changer. Being able to automate and constantly adjust infrastructure is one important reason to use cloud computing for your clients. And developing and operating systems that are able to recover from failure automatically has never been easier. Cloud providers offer you the needed infrastructure for a very reasonable pric...
Exploring Cloud Computing
Cloud Computing is enabling many trends in IT today: microservices, pay-as-you-go pricing, and serverless architectures, to name three. The biggest player in the market's Amazon, who offers the most mature cloud systems through their Amazon Web Services (AWS). Other companies are gaining traction as well: Google invests into their Google Cloud...
Think Complexity
Complexity science uses computation to explore the physical and social sciences. In Think Complexity, you'll use graphs, cellular automata, and agent-based models to study topics in physics, biology, and economics. Whether you're an intermediate-level Python programmer or a student of computational modeling, you'll delve into exam...
Foundations of Trusted Autonomy
This book establishes the foundations needed to realize the ultimate goals for artificial intelligence, such as autonomy and trustworthiness. Aimed at scientists, researchers, technologists, practitioners, and students, it brings together contributions offering the basics, the challenges and the state-of-the-art on trusted autonomous systems in a s...
Models, Methods and Tools for Product Service Design
This free book summarizes research being pursued within the Manutelligence project, the goal of which is to help enterprises develop smart, social and flexible products with high value added services. Manutelligence has improved Product and Service Design by developing suitable models and methods, and connecting them through a modular, collaborativ...
Cohesion, Coherence and Temporal Reference from an Experimental Corpus Pragmatics Perspective
This book provides new methodological and theoretical insights into temporal reference and its linguistic expression, from a cross-linguistic experimental corpus pragmatics approach. Verbal tenses, in general, and more specifically the categories of tense, grammatical and lexical aspect are treated as cohesion ties contributing to the temporal cohe...
Computational Conflict Research
This free book brings together a set of original studies that use cutting-edge computational methods to investigate conflict at various geographic scales and degrees of intensity and violence. Methodologically, this book covers a variety of computational approaches from text mining and machine learning to agent-based modelling and social network an...
Dynamic Spectrum Management
This open access book, authored by a world-leading researcher in this field, describes fundamentals of dynamic spectrum management, provides a systematic overview on the enabling technologies covering cognitive radio, blockchain, and artificial intelligence, and offers valuable guidance for designing advanced wireless communications systems. This b...

1 2 3 4 5 6 ... 8